Franklin
Staff View
LEADER 03468uam a2200373 a 4500
001
9977682575203681
005
20200110022710.6
006
m o d
007
cr cn
008
131015s2015 xx o eng
020
a| 1-84928-596-9
035
a| (CKB)3710000000359638
035
a| (CaSebORM)9781849285964
035
a| (EXLCZ)993710000000359638
041
0
a| eng
100
1
a| Krausz, Michael,
e| author.
245
1
0
a| Managing Information Security:
b| Studies from real life
h| [electronic resource] /
c| Krausz, Michael.
250
a| 2nd edition
264
1
b| IT Governance Publishing,
c| 2015.
300
a| 1 online resource (199 pages)
336
a| text
b| txt
2| rdacontent
337
a| computer
b| c
2| rdamedia
338
a| online resource
b| cr
2| rdacarrier
347
a| text file
588
0
#
a| Online resource; Title from title page (viewed January 29, 2015)
520
a| A comprehensive guide to managing an information security incident Even when organisations take precautions, they may still be at risk of a data breach. Information security incidents do not just affect small businesses: major companies and government departments suffer from them as well. Completely up to date with ISO/IEC 27001:2013, Managing Information Security Breaches sets out a strategic framework for handling this kind of emergency. The book provides a general discussion and education about information security breaches, how they can be treated and what ISO 27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. These case studies enable an in-depth analysis of the situations companies face in real life, and contain valuable lessons that your organisation can learn from when putting appropriate measures in place to prevent a breach. Understand what your top information security priorities should be The author explains what your top priorities should be the moment you realise a breach has occurred, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers. It will also be of use to personnel in non-IT roles, in an effort to make this unwieldy subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents. About the author Michael Krausz studied physics, computer science and law at the Vienna University of Technology, Vienna University and Webster University. Over the last 20 years he has become an accomplished professional investigator, IT expert and ISO 27001 auditor, investigating over a hundred cases of information security breaches. He has delivered over 5,000 hours of professional and academic training, and has provided consulting or investigation services in 21 countries. Buy this book today and better understand how to manage information security breaches in your organisation.
655
4
a| Electronic books.
776
z| 1-84928-595-0
906
a| BOOK